CVE-2021-27862
Summary
| CVE | CVE-2021-27862 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-09-27 19:15:00 UTC |
| Updated | 2022-10-12 13:15:00 UTC |
| Description | Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length and Ethernet to Wifi frame conversion (and optionally VLAN0 headers). |
Risk And Classification
Problem Types: CWE-290
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Ieee | Ieee 802.2 | All | All | All | All |
| Application | Ietf | P802.1q | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| IEEE SA - IEEE/ISO 802.2-1989 | CONFIRM | standards.ieee.org | |
| VU#855201 - L2 network security controls can be bypassed using VLAN 0 stacking and/or 802.3 headers | MISC | kb.cert.org | |
| draft-ietf-v6ops-ra-guard-08 - IPv6 Router Advertisement Guard | CONFIRM | datatracker.ietf.org | |
| Layer 2 network security bypass using VLAN 0, LLC/SNAP headers and invalid length | blog.champtar.fr | MISC | blog.champtar.fr | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Etienne Champetier (@champtar) <[email protected]>
There are currently no legacy QID mappings associated with this CVE.